Rate limits

Crawl Hub uses application quota for customer-specific limits and edge protection for coarse DDoS and abnormal-traffic defense.

Application quota

Plan, tenant, API key, domain, Credits, and concurrency limits are enforced by the application. These are the source of truth for customer-specific quotas.

Application 429

When application quota is exceeded, the API returns normalized JSON. It usually includes request_id, the exceeded limit, and a reset_at retry time.

{"request_id":"req_...","error":{"code":"rate_limit_exceeded","message":"Rate limit exceeded.","limit_name":"requests_per_minute","limit":120,"reset_at":"2026-05-13T12:35:00Z"}}

Edge protection 429

For DDoS, abnormal traffic, or short IP-based spikes, Cloud Armor can return a 429 before the request reaches the application. That response can be HTML or plain text and might not include request_id, limit, or reset_at.

Temporary bans and high-volume use

During abnormal access, temporary IP-based limits or ban candidates can apply. Contact us before sustained high-volume usage, fixed-IP automation, load testing, or CI traffic.

OpenAPI reference